Skip to content
1-888-762-8736(M-F 8:00am-5:00pm CST)
1-877-218-7353(M-F 8:00am-5:00pm CST)
href="http://www.trendmicro.com/us/enterprise/index.html" id="ENT-overview-test2" title="SEE ALL ENTERPRISE SOLUTIONS">Enterprise Overview
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It does not have any backdoor routine.
It does not drop any other file.
It does not have any downloading capability.
It does not have any information-stealing capability.
This worm does not have any backdoor routine.
This worm does not drop any other file.
This worm does not have any downloading capability.
This worm does not have any information-stealing capability.
This worm propagates via Skype. When an infected user uses Skype to chat with someone, this worm types and sends out the following message:
Here is a sample screenshot:
The message contains a link that may possibly lead to malware. However, the link is now inaccessible.
It does not have rootkit capabilities.
It does not exploit any vulnerability.
Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.
Identify and terminate files detected as WORM_PESKY.A
To terminate the malware/grayware/spyware process:
Scan your computer with your Trend Micro product to delete files detected as WORM_PESKY.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Connect with us on
| | | |